Let’s take a look at some of this week’s cyberattacks and other security incidents. It’s your weekly cybersecurity recap with Applied Tech!
Park’N Fly, Canada’s largest airport parking service provider, was recently hit with a cyberattack resulting in 1 million of their customers’ sensitive data being stolen. The stolen information includes full names, mailing addresses, email addresses, airplane numbers, and CAA numbers. Passwords and payment information were not stolen during this attack.
It was discovered that an authorized third party accessed the Park’N Fly network through remote VPN access sometime between July 11th and 13th of this year. After investigation, it was determined that personal information was stolen during the incident. After 5 days of working to resolve the issue and restore systems, Park’N Fly began adding additional security measures to prevent similar events from happening in the future.
(–Source: TechRadar on MSN
Read More: A million airport parking customers affected in huge data breach (msn.com) )
Last Wednesday, Dick’s Sporting Goods detected a cyberattack when they discovered that an unauthorized third-party had access to its information systems, including parts that contain confidential information. As soon as this was detected, the company’s cybersecurity response plan was activated and their external cybersecurity experts began working to contain the threat.
During the process of fighting the attack, the company’s store phone systems and email systems were shut down and all employees were locked out of their accounts until the IT staff began manually validating employees identities on camera to regain access. Many employees were/have been locked out for an extended period of time during this wait to be verified. The investigation of this incident is ongoing.
(–Soure: BleepingComputer
Read More: DICK’S shuts down email, locks employee accounts after cyberattack (bleepingcomputer.com) )
A “significant data breach” recently affected The Florida Department of Health. In this attack, hackers gained access to personal information including full names, medical records, social security numbers, addresses, and even banking information. This information, plus the plethora of other sensitive information that was stolen during this incident, makes this a noteworthy cyberattack.
Personalized letters have started being mailed to Floridians to alert them of this incident and let them know what specific pieces of their data may have been compromised in the attack.
The hacking group that carried out the attack and now holds the stolen data demanded a ransom. That ransom was not paid since the state of Florida has a policy of not paying ransom to criminals for cybercrimes like this one.
(–Source: NBC Miami on MSN
Read More: Personal info compromised in the Florida Department of Health data breach? Here’s what to do (msn.com) )
The Seattle-Tacoma airport, one of the largest airports in the United States, is still feeling the effects of a recent cyberattack that brought their computer systems down last weekend. As of right now, officials don’t have an estimate of when the systems will be restored.
No details about how the cyberattack on Port of Seattle, the operator of the airport, was carried out have been released, but the effects of it are affecting many day-to-day operations at the popular airport. With online communications affected, passengers are unable to see their flight status, airport Wi-Fi and baggage processing systems are down, and the airport’s email system is offline. Most major airlines with their own computer networks were unaffected, but smaller airlines and and international flights are being forced to check passengers in by hand.
With this week ending with a holiday weekend, the airport may face long wait times and delays as the TSA is expecting to screen 17 million people over the holiday travel period. Security operations have not been affected, but flight delays and wait times might be extended due to airport staff having to do many tasks manually.
(–Source: CNN on MSN
Read More: Cyberattack complicates travel at Seattle airport with holiday weekend approaching (msn.com) )
Last year, several dozen financial institutions were affected by the MoveIt cyberattack, but one credit union, Texas Dow Employees Credit Union, only found out that they were affected by this attack in July of this year, over a year after the attack took place.
TDECU has 386,000 members, but it’s expected that 500,474 people were actually affected by TDECU being one of the targets in this incident. Data compromised in this leak includes full names, date of birth, social security numbers, bank account information, and ID numbers. Potentially affected individuals have been notified by form of letter immediately after finding out about their involvement in the incident.
(–Source: Banking Dive
Read More: Texas credit union discovers year-old data breach | Banking Dive )